Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

The Security Blog

Get up-to-date security insights, tips, and tricks from our amazing team sent to your inbox.

Browse our blogs

We cover it all in The Security Blog. Discover what you’ve been looking for.

Topics
Author
Blog December 03 2024

Discovering a Deserialization Vulnerability in LINQPad

Discovering a Deserialization Vulnerability in LINQPad, written by James Williams, reveals a novel deserialization vulnerability in a.NET application with over…

Read about this article
Blog November 21 2024

A 5-Minute Guide to HTTP Response Codes

If you've done any network scanning or application testing, you've run into your fair share of HTTP response codes. If not, these codes will show up in most…

Read about this article
Blog November 14 2024

Attacking JWT with Self-Signed Claims

Understanding JWS vulnerabilities and how to exploit them is crucial for securing applications and APIs that use JSON Web Tokens (JWTs).

Read about this article
Blog November 13 2024

EKUwu: Not just another AD CS ESC

Using default version 1 certificate templates, an attacker can exploit a vulnerability (EKUwu) to generate certificates that bypass security controls,…

Read about this article
Blog November 07 2024

Detecting CVE-2020-0688 Remote Code Execution Vulnerability on Microsoft Exchange Server

Exploiting Indicators of Compromise: Understanding SYSMON, IIS Logs, and Process Execution for Enhanced Security.

Read about this article
Blog October 29 2024

Android Hacking for Beginners

Bypass Android security measures to access sensitive data and transfer funds with this step-by-step guide to exploiting vulnerabilities in the Damn Vulnerable…

Read about this article
Blog October 22 2024

Offensively Groovy

On a recent red team engagement, I was able to compromise the Jenkins admin user via retrieving the necessary components and decrypting credentials.xml. From…

Read about this article
Blog October 17 2024

Spec-tac-ula Deserialization: Deploying Specula with .NET

This post explains how.NET deserialization can be used to backdoor a workstation with Specula, making it a valuable resource for Red Team operations.

Read about this article
Blog October 15 2024

Let’s Clone a Cloner - Part 2: You Have No Power Here

Previously on Let's Clone a Cloner, I needed a long-range RFID badge cloner. There are many walkthroughs out there on how to build a cloner that are fantastic,…

Read about this article
Blog October 03 2024

Kicking it Old-School with Time-Based Enumeration in Azure

IntroductionYet another user-enumeration method has been identified in Azure. While Microsoft may have disabled Basic Authentication some time ago, we can…

Read about this article
Blog September 26 2024

Missing: Data Classification, Part 2 - Looking at System Classification

Recap of Part 1This is the second of a two-part series on Data Classification. The first part spoke to the fact that most security programs grow…

Read about this article
Blog September 24 2024

Pull Your SOCs Up

"It is a capital mistake to theorize before one has data. Insensibly one begins to twist facts to suit theories, instead of theories to suit facts."-Sir Arthur…

Read about this article